Search Results - (( program top optimization algorithm ) OR ( java effective visualization algorithm ))
Search alternatives:
-
1
Optimizing tree planting areas through integer programming and improved genetic algorithm
Published 2012“…To analyze the huge number of possible solutions with uncertain results manually will lead to unanswered decision of the optimal result determination. Therefore, a hybrid algorithm through an incorporation of Integer Programming and Improved Genetic Algorithm was proposed for planting lining design. …”
Get full text
Get full text
Thesis -
2
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
3
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
4
-
5
Automatic generation of neural game controller using single and bi-objective evolutionary optimization algorithms for RTS Game
Published 2015“…The proposed EC methods are Genetic Algorithm (GA), Differential Evolution (DE), Evolutionary Programming (EP), and Pareto-based Differential Evolution (PDE). …”
Get full text
Get full text
Get full text
Thesis -
6
Performance improvement through optimal location and sizing of distributed generation / Zuhaila Mat Yasin
Published 2014“…This thesis presents a new technique to determine the optimal locations and sizing of multiple DG units in a distribution system based on the concepts and principles of quantum mechanics in the Evolutionary Programming (EP) namely Quantum- Inspired Evolutionary Programming (QIEP). …”
Get full text
Get full text
Thesis -
7
A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications
Published 2025“…The second layer employed spatial data and the fuzzy Technique for Order Preference by Similarity to Ideal Solution algorithm to refine potential solar energy sites, yielding the top 100 optimal locations. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Integrated Scheduling and RTO of RGP with MPC and PI Controllers
Published 2009“…Modeling mismatch is minimized by rigorously exchanging values of key variables between dynamic and steady-state models. Optimal trajectories of set points are obtained using sequential quadratic programming algorithm with constraints. …”
Get full text
Get full text
Conference or Workshop Item -
9
Integrated Scheduling and RTO of RGP with MPC and PI Controllers
Published 2009“…Modeling mismatch is minimized by rigorously exchanging values of key variables between dynamic and steady-state models. Optimal trajectories of set points are obtained using sequential quadratic programming algorithm with constraints. …”
Get full text
Get full text
Conference or Workshop Item -
10
Integrated scheduling and RTO of RGP with MPC and PI controllers
Published 2009“…Modeling mismatch is minimized by rigorously exchanging values of key variables between dynamic and steady-state models. Optimal trajectories of set points are obtained using sequential quadratic programming algorithm with constraints. …”
Get full text
Get full text
Get full text
Get full text
Citation Index Journal -
11
Video traffic analysis on Unifi broadband network / Laina Sofia Mahamad
Published 2017“…Thirdly, to identify best traffic model based on fitted model in developing network traffic bandwidth control algorithms. MatLab Dfittool program is used to analyze and identify the best traffic model. …”
Get full text
Get full text
Thesis -
12
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. The first and second proposed methods were incorporated into the proposed Background Pass-Go (BPG) system and Visual Identification Protocol Professional (VIP Pro) system respectively. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Development Of Finite Element Codes For Shear Wall Analysis
Published 2008“…The multilayer shell and beam elements are available in the element library of this finite element program.Both above finite element codes are equipped with pre, post processing and animation graphic facilities. …”
Get full text
Get full text
Thesis
